Analysis
-
max time kernel
151s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 05:56
Behavioral task
behavioral1
Sample
8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe
Resource
win7-20220812-en
General
-
Target
8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe
-
Size
276KB
-
MD5
937e502cec06f20c20e4b0965398a6c0
-
SHA1
595feca769149be6bbb927119cbb4cead40ebf19
-
SHA256
8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e
-
SHA512
a4089c86fb2e0b41df40c2d9a893333f649162a74c00268d094253bf9bcda6b7f918b8b4f181680372921316a517949cc6dac0b81ab37a0a8a12dfa456903a1c
-
SSDEEP
6144:tk4q/dRlevKOqCKoVyL5AnbX8aqXoVSVKBmfWEE4T:69IZ0L5G5qXU6dvE4
Malware Config
Extracted
cybergate
2.6
vítima
basgaza.zapto.org:1604
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\Documents\\install\\install\\server.exe" 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\Documents\\install\\install\\server.exe" 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 server.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{3GBJA5E8-EB76-1L70-O60G-845J547OYFVV} 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3GBJA5E8-EB76-1L70-O60G-845J547OYFVV}\StubPath = "c:\\Documents\\install\\install\\server.exe Restart" 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
resource yara_rule behavioral1/memory/1384-54-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1384-57-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1384-63-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/780-68-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1384-69-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/780-70-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/780-71-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/files/0x0008000000012703-73.dat upx behavioral1/files/0x0008000000012703-74.dat upx behavioral1/files/0x0008000000012703-75.dat upx behavioral1/files/0x0008000000012703-77.dat upx behavioral1/memory/1528-79-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/780-81-0x0000000024080000-0x00000000240E2000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 780 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 780 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 780 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 780 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe Token: SeDebugPrivilege 780 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27 PID 1384 wrote to memory of 1064 1384 8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe"C:\Users\Admin\AppData\Local\Temp\8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe"1⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe"C:\Users\Admin\AppData\Local\Temp\8b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Documents\install\install\server.exe"C:\Documents\install\install\server.exe"3⤵
- Executes dropped EXE
PID:1528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5937e502cec06f20c20e4b0965398a6c0
SHA1595feca769149be6bbb927119cbb4cead40ebf19
SHA2568b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e
SHA512a4089c86fb2e0b41df40c2d9a893333f649162a74c00268d094253bf9bcda6b7f918b8b4f181680372921316a517949cc6dac0b81ab37a0a8a12dfa456903a1c
-
Filesize
276KB
MD5937e502cec06f20c20e4b0965398a6c0
SHA1595feca769149be6bbb927119cbb4cead40ebf19
SHA2568b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e
SHA512a4089c86fb2e0b41df40c2d9a893333f649162a74c00268d094253bf9bcda6b7f918b8b4f181680372921316a517949cc6dac0b81ab37a0a8a12dfa456903a1c
-
Filesize
229KB
MD5c7da3e8051ae1d6e2b3dafc6396551bb
SHA1ec38a7654dd663a6ed36a39aeb74825d10d8653f
SHA256c82d07e6c14906c9cd103ef2cef130ae6ac29cc6dec775d917f9d6d66a58089b
SHA512b7f8687e8e84dea6e69ab13dca72e46ac8be2b83a466a29e5e790adfdc940869e235b33441825d3796ccc9561afd2787a78fe4ac06266eaf5b8c11fc909c70b1
-
Filesize
276KB
MD5937e502cec06f20c20e4b0965398a6c0
SHA1595feca769149be6bbb927119cbb4cead40ebf19
SHA2568b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e
SHA512a4089c86fb2e0b41df40c2d9a893333f649162a74c00268d094253bf9bcda6b7f918b8b4f181680372921316a517949cc6dac0b81ab37a0a8a12dfa456903a1c
-
Filesize
276KB
MD5937e502cec06f20c20e4b0965398a6c0
SHA1595feca769149be6bbb927119cbb4cead40ebf19
SHA2568b968842b2f4eed2098bcb30d4570541438211a32d214c9d87de5a907f165e9e
SHA512a4089c86fb2e0b41df40c2d9a893333f649162a74c00268d094253bf9bcda6b7f918b8b4f181680372921316a517949cc6dac0b81ab37a0a8a12dfa456903a1c